Certified Incident Handler (ECIH)
This 3-day certification program focuses on equipping professionals with the skills to handle and respond to security incidents in an organization.
This 3-day certification program focuses on equipping professionals with the skills to handle and respond to security incidents in an organization.
CompTIA PenTest+ is an intermediate-level certification program designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment.
Join the ranks of cybersecurity experts and become a Certified Ethical Hacker with the comprehensive CEH v13 certification program.
Learn to perform an effective penetration test in EC Council’s live cyber range and take your pen testing skills to the next level.
This hands-on course will get you “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against ICSs.
Create secure .NET applications, focusing on the Secure Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
Create secure Java applications, focusing on the Secure Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
Detect, manage, and respond holistically to critical incidents, so that you can reduce the impact of the incident on your institution’s budget and reputation.
Learn to use SIEM solutions and predictive capabilities using threat intelligence. Explore the practical aspect of SIEM using the up-to-date tools and methods.
Master the methodology behind ethical hacking and prepare for the Certified Ethical Hacker exam through labs that mimic real-life scenarios.
Protect, detect, and respond to network attacks, through hands-on labs that have been based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
Identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for your organization through a cohesive understanding of business continuity and disaster recovery principles.
Conduct computer investigations using digital forensics technologies to detect hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
Connect technical knowledge with the management skills required to transition to the highest ranks of information security management.